4.6 Article

Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things

Zheng Yang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

Detection of Node Capture Attack in Wireless Sensor Networks

Sarita Agrawal et al.

IEEE SYSTEMS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment

Santanu Chatterjee et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Computer Science, Information Systems

Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things

Sandip Roy et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications

S. K. Hafizul Islam et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Theory & Methods

A secure chaotic map-based remote authentication scheme for telecare medicine information systems

Xiong Li et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices

Ding Wang et al.

IEEE SYSTEMS JOURNAL (2018)

Article Automation & Control Systems

Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks

Ding Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Theory & Methods

Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions

Prosanta Gope et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Editorial Material Engineering, Mechanical

Comments on An improved secure and efficient password and chaos-based two-party key agreement protocol

Chien-Ming Chen et al.

NONLINEAR DYNAMICS (2017)

Article Computer Science, Hardware & Architecture

Security Analysis of Password-Authenticated Key Retrieval

SeongHan Shin et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2017)

Article Automation & Control Systems

Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment

Mohammad Wazid et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Article Computer Science, Theory & Methods

Zipf's Law in Passwords

Ding Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Telecommunications

A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme

Lidong Han et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Proceedings Paper Computer Science, Information Systems

Targeted Online Password Guessing: An Underestimated Threat

Ding Wang et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Proceedings Paper Computer Science, Information Systems

On the Implications of Zipf's Law in Passwords

Ding Wang et al.

COMPUTER SECURITY - ESORICS 2016, PT I (2016)

Article Mathematics, Applied

Improved chaotic maps-based password-authenticated key agreement using smart cards

Han-Yu Lin

COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2015)

Article Computer Science, Information Systems

Robust Biometrics-Based Authentication Scheme for Multiserver Environment

Debiao He et al.

IEEE SYSTEMS JOURNAL (2015)

Article Computer Science, Hardware & Architecture

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Ding Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Computer Science, Information Systems

Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity

Ding Wang et al.

INFORMATION SCIENCES (2015)

Article Computer Science, Information Systems

Enhancing the security of password authenticated key agreement protocols based on chaotic maps

Tian-Fu Lee

INFORMATION SCIENCES (2015)

Article Computer Science, Hardware & Architecture

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

Ding Wang et al.

COMPUTER NETWORKS (2014)

Article Engineering, Electrical & Electronic

Security flaws in two improved remote user authentication schemes using smart cards

Chun-Guang Ma et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)

Article Mathematics, Applied

Chaotic maps-based password-authenticated key agreement using smart cards

Cheng Guo et al.

COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2013)

Article Automation & Control Systems

Novel Anonymous Authentication Scheme Using Smart Cards

Jia-Lun Tsai et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2013)

Review Computer Science, Hardware & Architecture

Dynamic ID-based remote user password authentication schemes using smart cards: A review

R. Madhusudhan et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2012)

Article Computer Science, Information Systems

Secure group key agreement protocol based on chaotic Hash

Xianfeng Guo et al.

INFORMATION SCIENCES (2010)

Article Engineering, Electrical & Electronic

Two-Factor User Authentication in Wireless Sensor Networks

Manik Lal Das

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Mathematics, Interdisciplinary Applications

Cryptanalysis of the public key encryption based on multiple chaotic systems

Linhua Zhang

CHAOS SOLITONS & FRACTALS (2008)

Article Computer Science, Hardware & Architecture

Two-factor mutual authentication based on smart cards and passwords

Guomin Yang et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2008)

Article Computer Science, Information Systems

A novel key agreement protocol based on chaotic maps

Di Xiao et al.

INFORMATION SCIENCES (2007)

Article Mathematics, Interdisciplinary Applications

Security problems with a chaos-based deniable authentication scheme

G Alvarez

CHAOS SOLITONS & FRACTALS (2005)

Article Engineering, Electrical & Electronic

Security of public-key cryptosystems based on Chebyshev polynomials

P Bergamo et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2005)

Article Mathematics, Interdisciplinary Applications

An efficient entire chaos-based scheme for deniable authentication

D Xiao et al.

CHAOS SOLITONS & FRACTALS (2005)

Article Engineering, Electrical & Electronic

A dynamic ID-based remote user authentication scheme

ML Das et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2004)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)